|
Welcome to the GSM-Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. Only registered members may post questions, contact other members or search our database of over 8 million posts. Registration is fast, simple and absolutely free so please - Click to REGISTER! If you have any problems with the registration process or your account login, please contact contact us . |
|
Register | FAQ | Donate | Forum Rules | Root any Device | ★iPhone Unlock★ | ★ Direct Codes ★ | Direct Unlock Source | Search | Today's Posts | Mark Forums Read |
| LinkBack | Thread Tools | Display Modes |
11-18-2014, 08:40 | #1 (permalink) |
Insane Poster Join Date: Mar 2014 Location: @ ebysGSM Lab
Posts: 71
Member: 2150080 Status: Offline Thanks Meter: 33 | Himax Polymer LI read cloning succes with spookey Start cloning... Searching for device. Please unplug the device, re-insert the battery and connect it again. USB is found, port name(PreLoader USB VCOM Port (COM55)), symbolic name(\\?\usb#vid_0e8d&pid_2000#6&295f6a4e&0&3#{a5d cbf10-6530-11d2-901f-00c04fb951ed}). Device connected. Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PRELOADER", ADDR(0000000000000000), LEN(0x0000000001400000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\MBR", ADDR(0000000001400000), LEN(0x0000000000080000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\EBR1", ADDR(0000000001480000), LEN(0x0000000000080000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PRO_INFO", ADDR(0000000001500000), LEN(0x0000000000300000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\NVRAM", ADDR(0000000001800000), LEN(0x0000000000500000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PROTECT_F", ADDR(0000000001d00000), LEN(0x0000000000a00000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PROTECT_S", ADDR(0000000002700000), LEN(0x0000000000a00000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\SECCFG", ADDR(0000000003100000), LEN(0x0000000000020000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\UBOOT", ADDR(0000000003120000), LEN(0x0000000000060000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\BOOTIMG", ADDR(0000000003180000), LEN(0x0000000000600000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\RECOVERY", ADDR(0000000003780000), LEN(0x0000000000600000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\SEC_RO", ADDR(0000000003d80000), LEN(0x0000000000600000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\MISC", ADDR(0000000004380000), LEN(0x0000000000080000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\LOGO", ADDR(0000000004400000), LEN(0x0000000000300000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\EBR2", ADDR(0000000004700000), LEN(0x0000000000080000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\EXPDB", ADDR(0000000004780000), LEN(0x0000000000a00000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\ANDROID", ADDR(0000000005180000), LEN(0x000000002bc00000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\CACHE", ADDR(0000000030d80000), LEN(0x0000000007e00000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\USRDATA", ADDR(0000000038b80000), LEN(0x0000000040000000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\FAT", ADDR(0000000078b80000), LEN(0x000000006f400000). Readback EMMC storage to "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\BMTPOOL", ADDR(00000000e7f80000), LEN(0x0000000001500000). Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PRELOADER". checksum_value(0xbd) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\MBR". checksum_value(0x8a) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\EBR1". checksum_value(0xf1) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PRO_INFO". checksum_value(0x86) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\NVRAM". checksum_value(0x8a) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PROTECT_F". checksum_value(0x4f) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\PROTECT_S". checksum_value(0x78) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\SECCFG". checksum_value(0x0) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\UBOOT". checksum_value(0xf1) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\BOOTIMG". checksum_value(0x98) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\RECOVERY". checksum_value(0x9a) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\SEC_RO". checksum_value(0x6b) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\MISC". checksum_value(0xf9) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\LOGO". checksum_value(0x37) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\EBR2". checksum_value(0xe9) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\EXPDB". checksum_value(0x0) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\ANDROID". checksum_value(0x49) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\CACHE". checksum_value(0x4) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\USRDATA". checksum_value(0xf0) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\FAT". checksum_value(0x95) Caculate Checksum for "E:\Android OS\HIMAX Polymer LI\read OS sam N9000 spookey\BMTPOOL". checksum_value(0x4b) DONE! |
The Following User Says Thank You to ebysgsm For This Useful Post: |
Bookmarks |
Thread Tools | |
Display Modes | |
| |
|